Download presentation
Presentation is loading. Please wait.
Published byOctavia Daniel Modified over 9 years ago
1
LEGAL AND ETHICAL USE AND PRACTICE Board Report on Technology Threats
2
Three Potential Threats Penetration of systems at all levels or points-of- entry Damage or Tampering through code manipulations Disaster Recovery Plans
3
Penetration of Systems Firewall penetration, Computer terminals, Server access, Kiosk Hackers Negligent users
4
Damage or Tampering Spam Viruses Worms
5
Disaster Recovery Plans Fire Flood, Terrorist, Acts of god
6
Type of Systems Threatened Student Information Systems VirtualUnited the Course Management System (CMS) Outlook Web Access - Student Email System
7
Student Information Systems Protection Solutions, Practice and Procedure Recommendations Window Servers: Lock Servers Secure with Socket Layer (SSL) Software Computer Access Personal access Password protection Frequently change passwords
8
Student Information Systems cont. Kiosk Lock Cabinets Secure all Ports- CD-ROM drives, Serial ports, Parallel Ports, USB Ports, FireWire Ports, Ethernet ports
9
Course Management Systems Protection Solutions, Practice and Procedure Recommendations Database moved from root directory Passwords changed Computers Locked Offices Locked
10
Outlook Web Access Protection Solutions, Practice and Procedure Recommendations Multiple spam filters Separate Wi-Fi Internet Firewalls Frequent scanning of system LDAP system Back-up storage Locking servers
11
Etiquette Email Etiquette You may want to SHOUT only a single word or two to emphasize a point. Don't send private messages through email. Use an appropriate subject line; this will help the recipient locate you message Pay attention to grammar and spelling. Sign all of your emails with your name. Don't forward emails without permission. Assume all material is copyright.
12
Etiquette Discussion Board Etiquette Be sensitive to others. Treat other people with respect and courtesy, especially in reference to social, cultural, and ethnic differences. Don't use sarcasm. It often falls flat and doesn't come across as you intended. Be careful with humor. The reader doesn't have the benefit of your facial expression, body language, or tone of voice. You can use emoticons or "e-mail body language" such as ;) for a wink or :( for a frown. Cooperate and share. Consider yourself a quest on the system just as if you were in someone's home. Be willing to share information with others on the Internet. In exchange for help and information you receive, be willing to answer questions and to share your resources. Carefully consider copyright. Just because something can be copied electronically doesn't mean it should be distributed without permission. Unless stated otherwise, all material on the Internet is copyrighted. Be alert for obscenity. (Smaldino, 2008, pg. 198)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.